{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T08:20:30Z","timestamp":1763367630792},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T00:00:00Z","timestamp":1685318400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T00:00:00Z","timestamp":1685318400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,29]]},"DOI":"10.23919\/cycon58705.2023.10181804","type":"proceedings-article","created":{"date-parts":[[2023,7,19]],"date-time":"2023-07-19T18:28:49Z","timestamp":1689791329000},"page":"381-397","source":"Crossref","is-referenced-by-count":1,"title":["From Cyber Security to Cyber Power: Appraising the Emergence of \u2018Responsible, Democratic Cyber Power\u2019 in UK Strategy"],"prefix":"10.23919","author":[{"given":"Joe","family":"Devanny","sequence":"first","affiliation":[{"name":"King&#x2019;s College London,Lecturer, Department of War Studies,London,United Kingdom"}]},{"given":"Andrew C.","family":"Dwyer","sequence":"additional","affiliation":[{"name":"University of London,Lecturer in Information Security, Information Security Group, Royal Holloway,London,United Kingdom"}]}],"member":"263","reference":[{"key":"ref1","article-title":"The UK\u2019s Cyber Strategy Is No Longer Just About Security","volume-title":"Carnegie Endowment for International Peace","author":"Beecroft","year":"2021"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4324\/9781351224543"},{"volume-title":"Assessing Military Cyber Maturity: Strategy, Institutions and Capability","year":"2022","author":"Blessing","key":"ref3"},{"key":"ref4","article-title":"Clarifying Responsible Cyber Power: Developing Views in the U.K. Regarding Non-intervention and Peacetime Cyber Operations","volume-title":"Lawfare Blog","author":"Buchan","year":"2022"},{"volume-title":"Summary Report: Acting Responsibly in Cyberspace WP3146","year":"2022","author":"Buchan","key":"ref5"},{"article-title":"Placing Cyber Diplomacy at the Top of the Agenda","volume-title":"Inside Cyber Diplomacy","year":"2022","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1080\/09557571.2018.1516196"},{"volume-title":"The National Security Council: National Security at the Centre of Government","year":"2014","author":"Devanny","key":"ref8"},{"volume-title":"The National Cyber Force that Britain Needs?","year":"2021","author":"Devanny","key":"ref9"},{"key":"ref10","first-page":"62","article-title":"The Review and Responsible, Democratic Cyber Power","volume-title":"The Integrated Review in Context: Defence and Security in Focus","author":"Devanny","year":"2021"},{"key":"ref11","article-title":"A Frontier Without Direction? The U.K.\u2019s Latest Position on Responsible Cyber Power","volume-title":"Lawfare Blog","author":"Dwyer","year":"2022"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780197638255.001.0001"},{"volume-title":"Director\u2019s Speech on Cyber Power \u2013 As Delivered","year":"2019","author":"Fleming","key":"ref13"},{"volume-title":"Organising a Government for Cyber: The Creation of the UK\u2019s National Cyber Security Centre","year":"2019","author":"Hannigan","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1080\/01402390.2020.1732354"},{"volume-title":"A Fierce Domain: Conflict in Cyberspace 1986\u20132012","year":"2013","author":"Healey","key":"ref16"},{"journal-title":"Cyber Security Strategy of the United Kingdom: Safety, Security and Resilience in Cyber Space (Cm 7642)","year":"2009a","key":"ref17"},{"volume-title":"Digital Britain: Final Report (Cm 7650)","year":"2009b","key":"ref18"},{"journal-title":"A Strong Britain in an Age of Uncertainty: The National Security Strategy (Cm 7953)","year":"2010a","key":"ref19"},{"journal-title":"Securing Britain in an Age of Uncertainty: The Strategic Defence and Security Review (Cm 7948)","year":"2010b","key":"ref20"},{"journal-title":"The UK Cyber Security Strategy: Protecting and Promoting the UK in a Digital World","year":"2011","key":"ref21"},{"journal-title":"National Cyber Security Strategy 2016\u201321","year":"2016","key":"ref22"},{"journal-title":"Global Britain in a Competitive Age: The Review of Security, Defence, Development and Foreign Policy (CP 403)","year":"2021a","key":"ref23"},{"journal-title":"National Cyber Strategy","year":"2021b","key":"ref24"},{"journal-title":"The National Cyber Force: Responsible Cyber Power in Practice","year":"2023","key":"ref25"},{"volume-title":"The United Nations, Cyberspace and International Peace and Security: Responding to Complexity in the 21st Century","year":"2017","author":"Kavanagh","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctt1djmhj1.6"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.23919\/CyCon55549.2022.9811024"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1080\/02684527.2020.1840746"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1080\/19331681.2020.1776658"},{"key":"ref31","article-title":"Spy Chief Sir Jeremy Fleming to Step Down as Director of GCHQ","volume-title":"Telegraph","author":"Nicholls","year":"2023"},{"volume-title":"Cyber Power","year":"2010","author":"Nye","key":"ref32"},{"key":"ref33","article-title":"The U.K. as a Responsible Cyber Power: Brilliant Branding or Empty Bluster?","volume-title":"Lawfare Blog","author":"Shires","year":"2021"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780197661628.001.0001"},{"key":"ref35","article-title":"Opinion: GCHQs\u2019 Director Should not Be Playing Guest Editor on the BBC","volume-title":"Stack","author":"Targett","year":"2023"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780190618094.001.0001"},{"volume-title":"National Cyber Power Index 2022","year":"2022","author":"Voo","key":"ref37"},{"key":"ref38","article-title":"The Rules-Based International Order: Some Hard Truths","volume-title":"Keynote presented at the 14th International Conference on Cyber Conflict: Keep Moving (CyCon 2022)","author":"Weaver","year":"2022"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2019.1569895"}],"event":{"name":"2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)","start":{"date-parts":[[2023,5,30]]},"location":"Tallinn, Estonia","end":{"date-parts":[[2023,6,2]]}},"container-title":["2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10181240\/10181347\/10181804.pdf?arnumber=10181804","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,23]],"date-time":"2024-04-23T05:11:32Z","timestamp":1713849092000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10181804\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,29]]},"references-count":39,"URL":"https:\/\/doi.org\/10.23919\/cycon58705.2023.10181804","relation":{},"subject":[],"published":{"date-parts":[[2023,5,29]]}}}